CVE-2025-5443: OS Command Injection in Linksys RE6500
A vulnerability, which was classified as critical, was found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Affected is the function wirelessAdvancedHidden of the file /goform/wirelessAdvancedHidden. The manipulation of the argument ExtChSelector/24GSelector/5GSelector leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI Analysis
Technical Summary
CVE-2025-5443 is a medium-severity OS command injection vulnerability affecting multiple Linksys range extender models, including RE6500, RE6250, RE6300, RE6350, RE7000, and RE9000, across several firmware versions (1.0.013.001, 1.0.04.001, 1.0.04.002, 1.1.05.003, and 1.2.07.001). The vulnerability resides in the wirelessAdvancedHidden function of the /goform/wirelessAdvancedHidden endpoint. Specifically, the parameters ExtChSelector, 24GSelector, and 5GSelector can be manipulated to inject arbitrary OS commands. This flaw allows an unauthenticated remote attacker to execute system commands on the device without requiring user interaction or prior authentication. The vulnerability is remotely exploitable over the network, potentially enabling attackers to compromise the device's operating system, gain control over the device, and pivot into the internal network. Despite the critical nature of command injection vulnerabilities, this issue has been rated medium severity with a CVSS 4.0 score of 5.3, reflecting some mitigating factors such as limited scope or impact on confidentiality, integrity, and availability. The vendor has not responded to early disclosure attempts, and no patches or mitigations have been officially released. Public exploit code has been disclosed, increasing the risk of exploitation in the wild.
Potential Impact
For European organizations, this vulnerability poses a significant risk to network security, especially for those relying on Linksys range extenders in their infrastructure. Successful exploitation could lead to full compromise of the affected devices, allowing attackers to intercept or manipulate network traffic, establish persistent footholds, or launch further attacks against internal systems. This is particularly concerning for enterprises, public institutions, and critical infrastructure operators using these devices to extend wireless coverage. The lack of vendor response and absence of patches exacerbate the threat, as organizations may be forced to rely on workarounds or device replacement. Additionally, the remote and unauthenticated nature of the exploit lowers the barrier for attackers, increasing the likelihood of targeted or opportunistic attacks. Confidentiality, integrity, and availability of network communications could be impacted, potentially leading to data breaches, service disruptions, or lateral movement within corporate networks.
Mitigation Recommendations
Given the absence of official patches, European organizations should immediately identify and inventory all affected Linksys range extender models and firmware versions within their networks. As a temporary mitigation, affected devices should be isolated from critical network segments and the internet to reduce exposure. Disabling remote management interfaces and restricting access to the wirelessAdvancedHidden endpoint via firewall rules or network segmentation can help limit attack vectors. Network monitoring should be enhanced to detect unusual command execution patterns or traffic anomalies indicative of exploitation attempts. Organizations should consider replacing vulnerable devices with models from vendors providing timely security updates. Additionally, implementing strict network access controls and employing intrusion detection/prevention systems can help detect and block exploitation attempts. Regular firmware audits and proactive vulnerability management processes should be established to prevent similar risks in the future.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2025-5443: OS Command Injection in Linksys RE6500
Description
A vulnerability, which was classified as critical, was found in Linksys RE6500, RE6250, RE6300, RE6350, RE7000 and RE9000 1.0.013.001/1.0.04.001/1.0.04.002/1.1.05.003/1.2.07.001. Affected is the function wirelessAdvancedHidden of the file /goform/wirelessAdvancedHidden. The manipulation of the argument ExtChSelector/24GSelector/5GSelector leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
AI-Powered Analysis
Technical Analysis
CVE-2025-5443 is a medium-severity OS command injection vulnerability affecting multiple Linksys range extender models, including RE6500, RE6250, RE6300, RE6350, RE7000, and RE9000, across several firmware versions (1.0.013.001, 1.0.04.001, 1.0.04.002, 1.1.05.003, and 1.2.07.001). The vulnerability resides in the wirelessAdvancedHidden function of the /goform/wirelessAdvancedHidden endpoint. Specifically, the parameters ExtChSelector, 24GSelector, and 5GSelector can be manipulated to inject arbitrary OS commands. This flaw allows an unauthenticated remote attacker to execute system commands on the device without requiring user interaction or prior authentication. The vulnerability is remotely exploitable over the network, potentially enabling attackers to compromise the device's operating system, gain control over the device, and pivot into the internal network. Despite the critical nature of command injection vulnerabilities, this issue has been rated medium severity with a CVSS 4.0 score of 5.3, reflecting some mitigating factors such as limited scope or impact on confidentiality, integrity, and availability. The vendor has not responded to early disclosure attempts, and no patches or mitigations have been officially released. Public exploit code has been disclosed, increasing the risk of exploitation in the wild.
Potential Impact
For European organizations, this vulnerability poses a significant risk to network security, especially for those relying on Linksys range extenders in their infrastructure. Successful exploitation could lead to full compromise of the affected devices, allowing attackers to intercept or manipulate network traffic, establish persistent footholds, or launch further attacks against internal systems. This is particularly concerning for enterprises, public institutions, and critical infrastructure operators using these devices to extend wireless coverage. The lack of vendor response and absence of patches exacerbate the threat, as organizations may be forced to rely on workarounds or device replacement. Additionally, the remote and unauthenticated nature of the exploit lowers the barrier for attackers, increasing the likelihood of targeted or opportunistic attacks. Confidentiality, integrity, and availability of network communications could be impacted, potentially leading to data breaches, service disruptions, or lateral movement within corporate networks.
Mitigation Recommendations
Given the absence of official patches, European organizations should immediately identify and inventory all affected Linksys range extender models and firmware versions within their networks. As a temporary mitigation, affected devices should be isolated from critical network segments and the internet to reduce exposure. Disabling remote management interfaces and restricting access to the wirelessAdvancedHidden endpoint via firewall rules or network segmentation can help limit attack vectors. Network monitoring should be enhanced to detect unusual command execution patterns or traffic anomalies indicative of exploitation attempts. Organizations should consider replacing vulnerable devices with models from vendors providing timely security updates. Additionally, implementing strict network access controls and employing intrusion detection/prevention systems can help detect and block exploitation attempts. Regular firmware audits and proactive vulnerability management processes should be established to prevent similar risks in the future.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-06-01T17:06:27.764Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 683d9584182aa0cae242f8b0
Added to database: 6/2/2025, 12:13:56 PM
Last enriched: 7/11/2025, 8:03:40 AM
Last updated: 8/18/2025, 11:34:31 PM
Views: 13
Related Threats
CVE-2025-50902: n/a
UnknownCVE-2025-43757: CWE-79: Cross-site Scripting in Liferay Portal
MediumCVE-2025-9240: Information Disclosure in elunez eladmin
MediumCVE-2025-43746: CWE-79: Cross-site Scripting in Liferay Portal
MediumCVE-2025-9239: Inadequate Encryption Strength in elunez eladmin
MediumActions
Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.